Cybersecurity For IACS - Cyber Risk Management Procedure
Cybersecurity For IACS - Cyber Risk Management Procedure
Procedure
Version 1.0
Important message
This document is one of a set of standards developed solely and specifically for use on
Transport Assets (as defined in the Asset Standards Authority Charter). It is not suitable for any
other purpose.
The copyright and any other intellectual property in this document will at all times remain the
property of the State of New South Wales (Transport for NSW).
You must not use or adapt this document or rely upon it in any way unless you are providing
products or services to a NSW Government agency and that agency has expressly authorised
you in writing to do so. If this document forms part of a contract with, or is a condition of
approval by a NSW Government agency, use of the document is subject to the terms of the
contract or approval. To be clear, the content of this document is not licensed under any
Creative Commons Licence.
This document may contain third party material. The inclusion of third party material is for
illustrative purposes only and does not represent an endorsement by NSW Government of any
third party product or service.
If you use this document or rely upon it without authorisation under these terms, the State of
New South Wales (including Transport for NSW) and its personnel does not accept any liability
to you or any other person for any loss, damage, costs and expenses that you or anyone else
may suffer or incur from your use and reliance on the content contained in this document. Users
should exercise their own skill and care in the use of the document.
This document may not be current and is uncontrolled when printed or downloaded. Standards
may be accessed from the Transport for NSW website at www.transport.nsw.gov.au
Standard governance
Owner: Lead Telecommunications Engineer, Asset Standards Authority
Authoriser: Chief Engineer, Asset Standards Authority
Approver: Executive Director, Asset Standards Authority on behalf of the ASA Configuration Control
Board
Document history
Version Summary of changes
1.0 First issue.
Preface
The Asset Standards Authority (ASA) is a key strategic branch of Transport for NSW (TfNSW).
As the network design and standards authority for NSW Transport Assets, as specified in the
ASA Charter, the ASA identifies, selects, develops, publishes, maintains and controls a suite of
requirements documents on behalf of TfNSW, the asset owner.
The ASA deploys TfNSW requirements for asset and safety assurance by creating and
managing TfNSW's governance models, documents and processes. To achieve this, the ASA
focuses on four primary tasks:
• publishing and managing TfNSW's process and requirements documents including TfNSW
plans, standards, manuals and guides
• collaborating with the Transport cluster and industry through open engagement
The AEO framework authorises engineering organisations to supply and provide asset related
products and services to TfNSW. It works to assure the safety, quality and fitness for purpose of
those products and services over the asset's whole-of-life. AEOs are expected to demonstrate
how they have applied the requirements of ASA documents, including TfNSW plans, standards
and guides, when delivering assets and related services for TfNSW.
Compliance with ASA requirements by itself is not sufficient to ensure satisfactory outcomes for
NSW Transport Assets. The ASA expects that professional judgement be used by competent
personnel when using ASA requirements to produce those outcomes.
This document covers cyber risk management for IACS within the TfNSW Transport Network
across the asset life cycle.
This document has been prepared by the ASA in consultation with TfNSW agencies and
industry representatives.
This document has been informed by concepts contained in IEC/TS 62443-1-1 Industrial
communication networks - Network and system security - Part 1-1: Terminology, concepts and
models and includes extracts from that standard.
The ASA thanks the International Electrotechnical Commission (IEC) for permission to
reproduce information from its international standards. All such extracts are copyright of IEC,
Geneva, Switzerland. All rights reserved.
IEC has no responsibility for the placement and context in which the extracts and contents are
reproduced by the author, nor is IEC in any way responsible for the other content or accuracy
therein.
Table of contents
1. Introduction .............................................................................................................................................. 7
2. Purpose .................................................................................................................................................... 7
2.1. Scope ..................................................................................................................................................... 7
2.2. Application ............................................................................................................................................. 7
3. Reference documents ............................................................................................................................. 8
4. Terms and definitions ............................................................................................................................. 9
5. Cyber risk management procedure ..................................................................................................... 11
6. High-level risk assessment .................................................................................................................. 13
6.1. Identify system under consideration .................................................................................................... 14
6.2. Perform criticality assessment ............................................................................................................. 15
6.3. Partition SuC into security zones and conduits ................................................................................... 16
6.4. Assign initial security level targets ....................................................................................................... 18
7. Detailed risk assessment ...................................................................................................................... 20
7.1. Identify threats ..................................................................................................................................... 21
7.2. Identify vulnerabilities .......................................................................................................................... 22
7.3. Determine unmitigated cyber risk ........................................................................................................ 24
7.4. Determine security level targets .......................................................................................................... 26
7.5. Identify and evaluate existing countermeasures ................................................................................. 27
7.6. Determine residual cyber risk .............................................................................................................. 28
7.7. Determine risk acceptance .................................................................................................................. 29
7.8. Apply additional cybersecurity countermeasures ................................................................................ 30
8. Continuous monitoring and reviewing ................................................................................................ 31
8.1. Monitor and review threats .................................................................................................................. 31
8.2. Monitor and review vulnerabilities ....................................................................................................... 32
Appendix A Responsibility assignment matrix ................................................................................... 35
Appendix B Overview of IDEF0 syntax ................................................................................................. 37
Appendix C Implementation examples ................................................................................................. 38
C.1. Digital train radio system ..................................................................................................................... 38
1. Introduction
The application of baseline cybersecurity countermeasures to protect against casual and
coincidental violations and intentional violation using simple means is explained in
T MU SY 10012 ST Cybersecurity for IACS - Baseline Cybersecurity System Requirements and
Countermeasures.
Cyber risk should be managed using a procedure that is suitable for industrial automation and
control systems (IACS). This procedure is based on draft ISA committee work products for
IEC 62443 Part 3-2 and has been tailored for the TfNSW Transport Network.
2. Purpose
This document specifies the procedure for consistent and effective management of cyber risks
for IACS across the TfNSW Transport Network.
This document aligns with the IEC 62443 series and is considered suitable for the management
of cyber risks in IACS.
2.1. Scope
This document explains the tailored procedures, processes and steps to manage cyber risk in
alignment with IEC 62443 series. The scope of this document covers all systems that comprise
a single integrated ‘automation solution’.
Note: Policies and procedures are the responsibility of the ‘asset owner’ which is not
addressed in this document. Refer to IEC 62443-2-1 Industrial communication
networks - Network and system security - Part 2-1: Establishing an industrial
automation and control system security program and IEC 62443-2-4 Security for
industrial automation and control systems - Part 2-4: Security program requirements
for IACS service providers for further information.
2.2. Application
This document applies to the asset owners and system integrators of IACS.
The roles of asset owner, system integrator and product supplier have been adopted from IEC
62443-3-3 Industrial communication networks - Network and system security - Part 3-3: System
security requirements and security levels.
• system integrator
This process applies across the plan, acquire and operate/maintain stages of the asset life
cycle.
This document applies to parties in accordance with the responsibility assignment matrix as
given in Appendix A.
This document shall be read in conjunction with the Cybersecurity for IACS series of standards
and IEC 62443 series of standards.
3. Reference documents
The following documents are cited in the text. For dated references, only the cited edition
applies. For undated references, the latest edition of the referenced document applies.
International standards
IEC 62280 Railway applications - Communication, signalling and processing systems - Safety
related communication in transmission systems
IEC/TS 62443-1-1 Industrial communication networks - Network and system security - Part 1-1:
Terminology, concepts and models
IEC 62443-2-1 Industrial communication networks - Network and system security - Part 2-1:
Establishing an industrial automation and control system security program
IEC 62443-2-4 Security for industrial automation and control systems - Part 2-4: Security
program requirements for IACS service providers
IEC 62443-3-3 Industrial communication networks - Network and system security - Part 3-3:
System security requirements and security levels
Australian standards
Legislation
Forum of Incident Response and Security Teams (FIRST) 2017, Common Vulnerability Scoring
System
The MITRE Corporation 2017, Common Attack Pattern Enumeration and Classification
(CAPEC™)
asset owner individual or company responsible for one or more IACS (IEC 62443-3-3 ed.1.0)
attack assault on a system that derives from an intelligent threat — i.e., an intelligent act that is
a deliberate attempt (especially in the sense of a method or technique) to evade security
services and violate the security policy of a system (IEC/TS 62443-1-1 ed.1.0)
attack tree formal, methodical way of finding ways to attack the security of a system
(IEC/TS 62443-1-1 ed.1.0)
automation solution control system and any complementary hardware and software
components that have been installed and configured to operate in an IACS (IEC 62443-2-4
ed.1.0)
conduit logical grouping of communication channels, connecting two or more zones, that share
common security requirements (IEC 62443-3-3 ed.1.0)
cybersecurity actions required to preclude unauthorized use of, denial of service to,
modifications to, disclosure of, loss of revenue from, or destruction of critical systems or
informational assets (IEC/TS 62443-1-1 ed.1.0)
cyber risk the potential for unauthorised use, disclosure, damage or disruption to assets
through the use of technology
enterprise system collection of information technology elements (i.e., hardware, software and
services) installed with the intent to facilitate an organization’s business process or processes
(administrative or project) (IEC/TS 62443-1-1 ed.1.0)
IDEF0 box a rectangle containing a box name, a box number, and possibly a box detail
reference and representing a function in a diagram (ISO/IEC/IEEE 31320-1:2012)
IDEF0 control a condition or set of conditions required for a function to produce correct output
(ISO/IEC/IEEE 31320-1:2012)
IDEF0 input that which is transformed by a function into output (ISO/IEC/IEEE 31320-1:2012)
IDEF0 mechanism the means used by a function to transform input into output
(ISO/IEC/IEEE 31320-1:2012)
IACS industrial automation and control systems; collection of personnel, hardware, and
software that can affect or influence the safe, secure, and reliable operation of an industrial
process (IEC/TS 62443-1-1 ed.1.0)
product supplier manufacturer of hardware and/or software product (IEC 62443-3-3 ed.1.0)
risk expectation of loss expressed as the probability that a particular threat will exploit a
particular vulnerability with a particular consequence (IEC/TS 62443-1-1 ed.1.0)
risk management process of identifying and applying countermeasures commensurate with the
value of the assets protected, based on a risk assessment (IEC/TS 62443-1-1 ed.1.0)
security event occurrence in a system that is relevant to the security of the system
(IEC/TS 62443-1-1 ed.1.0)
security zone grouping of logical or physical assets that share common security requirements
(IEC/TS 62443-1-1 ed.1.0)
TfNSW Transport Network the transport system owned and operated by TfNSW or its
operating agencies upon which TfNSW has power to exercise its functions as conferred by the
Transport Administration Act or any other Act
threat potential for violation of security, which exists when there is a circumstance, capability,
action, or event that could breach security and cause harm (IEC/TS 62443-1-1 ed.1.0)
All definitions from IEC/TS 62443-1-1 ed.1.0 are Copyright © 2009 IEC Geneva,
Switzerland. www.iec.ch
All definitions from IEC 62443-2-4 ed.1.0 are Copyright © 2017 IEC Geneva,
Switzerland. www.iec.ch
All definitions from IEC 62443-3-3 ed.1.0 are Copyright © 2013 IEC Geneva,
Switzerland. www.iec.ch
The procedure aligns with the IEC 62443 series and is considered suitable for the management
of cyber risks in IACS.
This procedure has been based on the draft ISA committee work products for
IEC 62443 Part 3-2 to minimise future work.
Note: ASA intends to tailor the conformance of IEC 62443 Part: 3-2 following
publication by the IEC.
This procedure requires an established risk management framework and process to be in place
that complies with AS/NZS ISO 31000 Risk management – Principles and guidelines.
The procedure has been tailored to TfNSW risk criteria defined in T MU MD 20002 ST Risk
Criteria for Use by Organisations Providing Engineering Services.
This procedure is divided into the following three sub-procedures that align with the TfNSW
asset life cycle:
• high-level risk assessment procedure performed in the ‘plan’ stage of the asset life cycle,
detailed in Section 6
• detailed risk assessment procedure performed in the ‘acquire’ stage of the asset life cycle,
detailed in Section 7
This procedure is depicted by diagrams, which uses the Integration Definition (IDEF0) modelling
language. An overview of the IDEF0 syntax is provided in Appendix B.
Examples of selected process outputs have been provided to assist in the implementation of
this procedure in Appendix C.
An overview of the high-level risk assessment procedure is shown in Figure 1. Each of the processes within the high-level risk assessment procedure is explained in Section 6.1 through to Section 6.4.
IEC/TS
62443-1-1
Boundaries &
points of access
Operations concept
Identify SuC
Maintenance concept
Preferred &
alternate options 6.1
System
Asset owner T MU MD
integrator
(A,R) 20002 ST
(C)
Criticality
ratings
Perform criticality
Business requirements
specification
assessment
Safety impact
assessment 6.2
System Product
Asset owner IEC/TS
integrator supplier
(A,R) 62443-1-1
(C) (C)
Security zones
& conduits
Partition SuC
into security
zones & conduits
6.3
System
Asset owner IEC
integrator
(A,R) 62443-3-3
(C)
System
Asset owner
integrator
(A,R)
(C)
The inputs, outputs, controls and mechanisms for identifying the SuC are shown in Figure 2.
IEC/TS
62443-1-1
Operations concept
Identify SuC Boundaries &
Maintenance concept
points of access
Preferred &
alternate options 6.1
System
Asset owner
integrator
(A,R)
(C)
• The preferred and alternate options. These options describe the process or utility areas of
the SuC.
a. Identify all physical and logical boundaries of the SuC and each process or utility area.
b. Identify all physical and logical points of access to the SuC and each process or utility area.
The criticality assessment is an initial high-level risk assessment where the likelihood of the
security event is assumed ‘almost certain’ as defined in T MU MD 20002 ST.
Note: This is consistent with the discussion on calibrating likelihood contained within
IEC 62443-2-1 Annex A, which states that one method to calibrate likelihood is to use
a probability of 100%.
The inputs, outputs, controls and mechanisms for performing the criticality assessment are
shown in Figure 3.
T MU MD
20002 ST
Boundaries &
points of access Perform criticality
Business requirements
specification
assessment Criticality ratings
Safety impact
assessment 6.2
System Product
Asset owner
integrator supplier
(A,R)
(C) (C)
• records of the boundaries and points of access to the SuC and each process or utility area
a. Identify risk scenarios and credible worst case consequences for the risk events of loss of
confidentiality, integrity and availability for each process or utility area and the SuC.
Note: The high-level security objectives of confidentiality, integrity and availability are
commonly used within information security and are further developed into seven
foundational requirements by the IEC 62443 series.
Note: In addition, impacts that continue beyond one calendar day should be
considered within business continuity and resilience plans.
b. Assess the consequence descriptor and rating for each consequence impact area using
the TfNSW consequence criteria as defined in T MU MD 20002 ST.
Note: The likelihood is assumed fixed in the planning stage of the asset life cycle to
overcome difficulties in agreement as discussed in IEC 62443-2-1 Annex A. The
detailed risk assessment process does not assume a fixed likelihood.
c. Assess the risk descriptor and rating for each identified risk.
Note: Risk ranking D ‘low – broadly acceptable’ does not apply where likelihood is
descriptor ‘almost certain’ and rating L1.
d. Determine the highest risk rating for each process or utility area and the SuC.
e. Assign the highest risk rating for each process or utility area and the SuC as the criticality
rating.
Note: As likelihood is assumed fixed, this document refers to this high-level risk rating
simply as the criticality rating.
The inputs, outputs, controls and mechanisms for partitioning the SuC are shown in Figure 4.
IEC/TS
62443-1-1
Partition SuC
into security
Criticality ratings Security zones & conduits
zones & conduits
6.3
System
Asset owner
integrator
(A,R)
(C)
Notes:
2. Conduits that meet the criteria for trust defined in T MU SY 10012 ST can be
considered a category 1 or category 2 transmission system as defined in IEC 62280,
subject to fulfilment and maintenance of the preconditions over the design life of the
SuC.
3. Conduits that do not meet the criteria for trust defined in T MU SY 10012 ST can be
considered a category 3 transmission system as defined in IEC 62280.
Note: The detailed risk assessment may revise the SL-T to a higher level.
The inputs, outputs, controls and mechanisms for assigning initial security level targets are
shown in Figure 5.
IEC
62443-3-3
System
Asset owner
integrator
(A,R)
(C)
• sensitive or security classified information from Australian Cyber Security Centre (ACSC)
agencies, such as Australian Signals Directorate (ASD), Australian Security Intelligence
Organisation (ASIO) and CERT Australia
• published security advisories, such as from ASD OnSecure or CERT Australia portals
a. Determine whether specific threat agents that intend to target the SuC, or similar IACS,
automation solutions and products, exist over the design life of the SuC.
b. If no specific threat agents exist, then categorise general threat agents as either ‘internal’
or ‘external’.
c. Assess the means, resources, skills and motivation of threat agents over the design life of
the SuC. Refer to IEC 62443-3-3 Annex A for further information.
Security level targets SL-T 0 or 1 shall not be assigned to security zones within the SuC.
An overview of the detailed risk assessment process is shown in Figure 6. Each of the processes within the high-level risk assessment procedure is explained in Section 7.1 through to Section 7.8.
T MU AM MITRE
02001 ST CAPEC
Professional
review
Criticality ratings
Identify vulnerabilities
Vulnerabilities
Public security advisories
Supplier security advisories 7.2
Determine
inherent cyber risk
rating
7.3
System Product
Asset owner Risk IEC Risk
integrator supplier
(A,C) register 62443-3-3 register
(R) (C) SL-T
vectors
Determine
security level
targets
Minimum SL-Ts
7.4
System
Asset owner IEC
integrator
(A,C) 62443-3-3
(R)
Identify and
evaluate existing
coutermeasures
7.5
System Product
Asset owner Risk T MU MD
integrator supplier
(A,C) register 20002 ST
(R) (C)
Determine
residual cyber risk
7.6
System Product
Asset owner Risk T MU MD
integrator supplier
(A,C) register 20002 ST
(R) (C)
Determine risk
acceptance
7.7
Asset System
IEC
owner integrator
Risk register 62443-3-3
(A,C) (R)
System Product
Asset owner
integrator supplier
(A,C)
(R) (C)
The inputs, outputs, controls and mechanisms for identifying threats are shown in Figure 7.
T MU AM MITRE
02001 ST CAPEC
System Product
Asset owner
integrator supplier
(A,C)
(R) (C)
• records of criticality ratings for each process or utility area and the SuC
• published security advisories; such as from ASD OnSecure or CERT Australia portals
a. Record all assets within each process or utility area within the SuC in an asset register in
accordance with T MU AM 02001 ST Asset Information and Register Requirements.
b. Record all physically accessible data communication and peripheral interfaces of assets as
attributes in the asset register.
c. Prior to final design, obtain an independent professional review of credible threats using
competent persons, certified in threat intelligence or threat analysis who have an
appropriate degree of independence.
Notes:
2. The review should address credible threats to the SuC and to similar IACS,
automation solutions and products over the design life of the SuC.
ii. different person within the same organisation, for criticality rating B and C
d. List the credible threats, including threat agents and threat actions, over the design life of
the SuC.
e. Describe the threat actions of a threat agent in accordance with the domains of attack and
mechanisms of attack views as defined in The MITRE Corporation Common Attack Pattern
Enumeration and Classification (CAPEC™) dictionary of known attacks.
f. Develop fault trees or attack trees to model the threat actions used by threat actors for
each of the following general security events within the context of the SuC:
• asset register
The inputs, outputs, controls and mechanisms for identifying vulnerabilities are shown in
Figure 8.
System Product
Asset owner
integrator supplier
(A,C)
(R) (C)
• records of criticality ratings for each process or utility area and the SuC
• published security advisories, such as from ASD OnSecure or CERT Australia portals
Notes:
ii. different person within the same organisation, for criticality rating B and C
o all relevant published vulnerabilities and exposures from The MITRE Corporation
Common Vulnerabilities and Exposures (CVE®) list of entries
o for assets within security zones and conduits of criticality rating A, all credible
weaknesses for which at the time of analysis a known vulnerability or exposure has
not yet been discovered
c. Revise the fault or attack trees to indicate credible vulnerabilities in the branches.
• records of vulnerabilities
The inputs, outputs, controls and mechanisms for determining unmitigated cyber risk are shown
in Figure 9.
T MU MD
20002 ST
Determine
unmitigated cyber
Fault/attack tree Risk register
risk
7.3
System Product
Asset owner
integrator supplier
(A,C)
(R) (C)
a. Record the risks corresponding to the branches from the fault or attack tree in a risk
register.
Note: The top event of the tree relates to the ‘risk event’, and threat agents, actions
and vulnerabilities relate to ‘causes’.
b. Estimate the credible worst case consequences and likelihood descriptors in accordance
with T MU MD 20002 ST for each risk prior to assessing the application or effectiveness of
existing cybersecurity countermeasures that are not enabled by default.
Note: The effect of countermeasures that are not vulnerable to threats through the use
of technology may be considered, such as physical, mechanical, electric and
electronic independent protection layers.
c. Determine the unmitigated cyber risk rating for each risk in accordance with
T MU MD 20002 ST.
Note: The unmitigated cyber risk relates to the ‘inherent risk rating’.
The inputs, outputs, controls and mechanisms for determining the SL-T are shown in Figure 10.
IEC
62443-3-3
System
Asset owner
integrator
(A,C)
(R)
• risk register
a. Determine the applicable foundational requirements as defined in IEC 62443-3-3 for each
risk.
Note: If a foundational requirement does not apply to the security zone or conduit, a
SL-T of 0 may be assigned.
The inputs, outputs, controls and mechanisms for identifying and evaluating existing
countermeasures are shown in Figure 11.
IEC
62443-3-3
System Product
Asset owner
integrator supplier
(A,C)
(R) (C)
• risk register
b. Identify the applicable system requirements from IEC 62443-3-3 that provide technical
security capabilities and meet the target security levels expressed by the SL-T vector.
d. Record the existing countermeasures and their effectiveness in the risk register.
The inputs, outputs, controls and mechanisms for determining residual cyber risk are shown in
Figure 12.
T MU MD
20002 ST
Determine
Risk register residual cyber risk Risk register
7.6
System Product
Asset owner
integrator supplier
(A,C)
(R) (C)
a. Estimate the credible worst case consequences and likelihood descriptors in accordance
with T MU MD 20002 ST.
c. Record the residual consequence and likelihood descriptors and residual cyber risk in the
risk register.
Note: The residual cyber risk relates to the ‘residual current risk’.
Note: The Rail Safety National Law 2012 (NSW) requires that risks to safety are
eliminated so far as is reasonably practicable (SFAIRP), or otherwise minimised to
SFAIRP.
The inputs, outputs, controls and mechanisms for determining risk acceptance are shown in
Figure 13.
T MU MD
20002 ST
Determine risk
Risk register acceptance Risk register
7.7
Asset System
owner integrator
(A,C) (R)
a. Evaluate the risk and determine whether the residual current cyber risk is acceptable to
TfNSW in accordance with T MU MD 20002 ST.
c. If the residual current cyber risk is not acceptable, then apply additional cybersecurity
countermeasures as explained in Section 7.8 to further treat the risk.
This process only applies where the residual current cyber risk was determined to be not
acceptable by TfNSW and further treatment is required.
The inputs, outputs, controls and mechanisms for applying additional cybersecurity
countermeasures are shown in Figure 14.
IEC
62443-3-3
System Product
Asset owner
integrator supplier
(A,C)
(R) (C)
a. Identify the applicable system requirements from IEC 62443-3-3 that provide technical
security capabilities to further treat risks.
Work Health and Safety Regulation 2011 contains a hierarchy of control measures. In
particular, administrative controls shall only be implemented where engineering controls
are not reasonably practicable.
e. Record the additional countermeasures and their effectiveness in the risk register.
f. Determine the residual planned cyber risk rating by repeating the process from Section 7.6.
Each of the processes within continuous monitoring and reviewing is explained in Section 8.1
through Section 8.2.
The inputs, outputs, controls and mechanisms for monitoring and reviewing threats are shown in
Figure 15.
MITRE
CAPEC
Criticality ratings
Threat agents
Monitor and review
Public security advisories threats Maintenance schedule
Supplier security advisories
Historical data 8.1
Product
Asset owner
supplier
(A,R,C)
(C)
• records of criticality ratings for each process or utility area and the SuC
• published security advisories, such as from ASD OnSecure or CERT Australia portals
a. Monitor advisories and historical data for new and changed threats at least every day.
b. Review threats and schedule maintenance activities to treat new and changed threats.
c. Repeat the detailed risk assessment explained in Section 7.1 for each new or changed
threat and at least annually.
The inputs, outputs, controls and mechanisms for monitoring and reviewing vulnerabilities are
shown in Figure 16.
Product
Asset owner
supplier
(A,R,C)
(C)
• records of criticality ratings for each process or utility area and the SuC
• records of vulnerabilities
• published security advisories, such as from ASD OnSecure or CERT Australia portals
a. Monitor advisories and historical data for new and changed vulnerabilities at least every
day.
c. Repeat the detailed risk assessment explained in Section 7.2, for new or changed
vulnerability and at least annually.
Asset life cycle stage Process Asset owner Asset owner Asset owner System Product
(operator) (maintainer) integrator supplier
Plan Identify system under A, R C
consideration
Plan Perform criticality assessment A, R C C
Plan Partition SuC into security zones A, R C
and conduits
Plan Assign initial security level targets A, R C
Acquire Identify threats A, C C C R C
Acquire Identify vulnerabilities A, C C C R C
Acquire Determine unmitigated cyber risk A, C C C R C
Acquire Determine security level targets A, C C C R
Acquire Identify and evaluate existing A, C C C R C
countermeasures
Acquire Determine residual cyber risk A, C C C R
Acquire Determine risk acceptance A, C C C R
Acquire Apply additional cybersecurity A, C C C R C
countermeasures
Operate/maintain Monitor and review threats A, C C R C
Operate/maintain Monitor and review vulnerabilities A, C C R C
Responsibility Description
Responsible The person or persons who are actively expected to engage in the activity.
Accountable The person who is ultimately accountable for the results. Has the authority to
make decisions.
Consulted The person who has relevant expertise / information to contribute to the risk
analysis and evaluation. This person is involved prior to decisions.
Informed The person who does not need to participate in the risk management but
needs to be kept informed. This person needs to know of the decision or
action.
Control
Process or
Input function name Output
A0
Mechanism
An example IDEF0 diagram is shown in Figure 18. The diagram shows the following elements:
• IDEF0 inputs - operations concept, maintenance concept, preferred and alternate options
• IDEF0 mechanisms - asset owner (shown as accountable and responsible) and system
integrator (shown as consulted)
IEC/TS
62443-1-1
Operations concept
Identify SuC Boundaries &
Maintenance concept
points of access
Preferred &
alternate options 6.1
System
Asset owner
integrator
(A,R)
(C)
Some of the workbooks contained in Appendix F of HB 167:2006 have been adapted for these
examples.
Industrial automation
Enterprise systems System under consideration (SuC) and control systems
(IACS)
Asset
Train location
management
system
system
Configuration Fault
management management
system system
Records
management
system
C.1.2 Boundaries and points of access – SuC process and utility areas
Figure 20 shows an example context drawing of physical and logical points of access.
The boundaries of physical access are represented as ‘sites’ and depicted using round-edged rectangles with solid lines.
Logical access is represented as wide area networks (WAN) and local area networks (LAN).
In this example, LANs are trusted and are depicted as white conduits, while WANs are untrusted and are depicted as dark grey conduits.
Site not developed in this example. Site not developed in this example.
Core Router
WAN conduit to
DTRS Core (Secondary Site)
– not developed in this example.
DTRS LAN
WAN conduit to
DTRS Core (Secondary Site)
– not developed in this example.
Router Router
UPS
(Primary) (Secondary)
DTRS LAN
Portable HMI
BTS BTS
terminal
Mobile Mobile
station station
(MS) (MS)
Table 4 - Example criticality / high-level risk assessment table for DTRS SuC – by risk events and scenarios
Process or utility Risk event Risk scenario Consequence impact Consequence Risk descriptor
area area descriptor and rating & rating
SuC Loss of Core router fails at all core network sites. Health and safety (injury Moderate (rating – C4) High (B)
availability Network-wide use of backup radio system and disease)
(degraded operations) with delays in
responding to emergencies.
SuC Loss of Core router fails at all core network sites. Customer experience Major (rating – C3) Very high (A)
availability Network-wide use of backup radio system and operational reliability
(degraded operations) with major operational
impacts.
An example table for the ‘core network site’ utility area of a digital train radio system (DTRS) SuC is shown in Table 5.
Table 5 - Example criticality / high-level risk assessment table for DTRS ‘core network site’ – by risk events and scenarios
Process or utility Risk event Risk scenario Consequence impact Consequence Risk descriptor &
area area descriptor and rating rating
Core network site Loss of Core router fails at one core network site. Health and safety (injury Insignificant (rating – Medium (C)
availability Switchover to alternate core router with delays in and disease) C6)
responding to emergencies.
Failure to switchover to alternate core router
with network-wide use of backup radio system
(degraded operations) with delays in responding
to emergencies.
Process or utility Risk event Risk scenario Consequence impact Consequence Risk descriptor &
area area descriptor and rating rating
Core network site Loss of Core router fails at one core network site. Customer experience and Minor (rating – C5) High (B)
availability Switchover to alternate core router with minor operational reliability
operational impacts.
Failure to switchover to alternate core router
with network-wide use of backup radio system
(degraded operations) with major operational
impacts.
An example criticality rating for the processes and utility areas within the DTRS SuC is shown in Table 6.
Table 6 - Example criticality ranking of process and utility areas and DTRS SuC
The security zones and conduits model has been adapted to suit the SuC and differs from the reference model described in T MU SY 10010 ST.
The zones are based on physical sites and are depicted using rounded-edged rectangles with solid lines.
The zones that are based on logical principles are depicted using round-edged rectangles with dotted lines.
LANs are under the direct control of DTRS and are considered trusted, while WANs are considered untrusted.
Trusted conduits are depicted as white conduits, while untrusted conduits are depicted as grey conduits.
Zone not developed in this example. Zone not developed in this example.
DTRS DMZ
Core Router
WAN conduit to
DTRS DMZ (Secondary)
– not developed in this example.
DTRS LAN
WAN conduit to
DTRS DMZ (Secondary)
– not developed in this example.
Router Router
UPS
(Primary) (Secondary)
DTRS LAN
Portable HMI
BTS BTS
terminal
Mobile Mobile
station station
(MS) (MS)
ID Zone affected Asset affected Threat agent Threat actions – Threat actions – Threat actions – Security event
CAPEC™ CAPEC™ attack Attack description
category pattern
THR-01 DTRS DMZ Core router External 403 Social 410 Information Obtain information about Loss of availability – disruption to
engineering elicitation the core router IACS functions
THR-05 DTRS DMZ Core router External 437 Supply chain 439 Modification Modification or Loss of availability – disruption to
during manipulation of the core IACS functions
distribution router during distribution
THR-10 DTRS DMZ Core router Internal 513 Software 112 Brute force Brute force using Loss of availability – disruption to
password recovery tool to IACS functions
obtain privileged
credentials for core router
THR-10 DTRS DMZ Core router Internal 513 Software 114 Log on to core router Loss of availability – disruption to
Authentication using valid privileged IACS functions
abuse credentials obtained using
illegitimate means
THR-17 DTRS DMZ Core router Internal 514 Physical 390 Bypassing Use previously issued key Loss of availability – disruption to
External security physical security to obtain physical access IACS functions
to core router Loss of availability – destruction of
IACS or information assets
ID Zone affected Asset affected Vulnerability – Severity – Weakness – Vulnerability Security event
CVE® entry CVSS score CWE™ category description
VUN-01 DTRS DMZ Core router XYZ CVE-YYYY-XXXX 6.5 (Medium) 310 Weak Loss of confidentiality – disclosure of
Cryptographic cryptographic information assets
issues algorithm for Loss of availability – disruption to
stored passwords IACS functions
Physically destroy
Alter configuration
device
of Core Router
(CAPEC 547)
Core Router
exploitable
Weak
cryptographic
Core Router
algorithm for
XYZ
stored
passwords
DTRS_SuC-01 Core router fails at all Unauthorised employee (threat agent) uses weak cryptographic Failure to switchover to alternate core router with network-wide use
core network sites algorithm for stored passwords in all core routers (vulnerability) of backup radio system (degraded operations) with delays in
to exploit core routers, obtain privileged access and alter responding to emergencies and major operational impacts.
configuration (threat actions)
DTRS_DMZ-01 Core router fails at Unauthorised employee (threat agent) uses weak cryptographic Switchover to alternate core router with delays in responding to
one core network site algorithm for stored passwords in core router (vulnerability) to emergencies and minor operational impacts.
exploit core router, obtain privileged access and alter Failure to switchover to alternate core router with network-wide use
configuration (threat actions) of backup radio system (degraded operations) with delays in
responding to emergencies and major operational impacts.
DTRS_DMZ-02 Core router fails at Disgruntled former employee (threat agent) obtains physical Switchover to alternate core router with delays in responding to
one core network site access to core router and destroys it (threat actions) emergencies and minor operational impacts.
Failure to switchover to alternate core router with network-wide use
of backup radio system (degraded operations) with delays in
responding to emergencies and major operational impacts.
Risk name Inherent controls Control effectiveness Likelihood rating Consequence rating Inherent risk rating
DTRS_SuC-01 By default, passwords are stored on Ineffective Unlikely Major C
core router using a reversible
encryption algorithm (DES, AES)
DTRS_DMZ-01 By default, passwords are stored on Ineffective Unlikely Minor D
core router using a reversible
encryption algorithm (DES, AES)
DTRS_DMZ-02 HR Separations Policy Ineffective Unlikely Minor D
Physical keys
Risk name IEC 62443-3-3 IEC 62443-3-3 system Current controls Control Likelihood Consequence Residual
foundational requirements effectiveness rating rating current risk
requirements rating
DTRS_SuC-01 Identification and SR 1.5 - Authenticator Use irreversible hashing algorithm Effective Very unlikely Minor D
authentication control management for stored passwords (SR 1.5, SR
(IAC) SR 4.3 - Use of 4.3)
Use control (UC) cryptography Central monitoring of access
Data confidentiality (DC) SR 6.2 - Continuous control and configuration changes
Timely response to monitoring (SR 6.2)
events (TRE) SR 7.4 - Control system Device configuration files stored
Resource availability recovery and in configuration management
(RA) reconstitution system (SR 7.4)
Risk name IEC 62443-3-3 IEC 62443-3-3 system Current controls Control Likelihood Consequence Residual
foundational requirements effectiveness rating rating current risk
requirements rating
DTRS_DMZ-01 Identification and SR 1.5 - Authenticator Use irreversible hashing algorithm Effective Very unlikely Insignificant D
authentication control management for stored passwords (SR 1.5, SR
(IAC) SR 4.3 - Use of 4.3)
Use control (UC) cryptography Central monitoring of access
Data confidentiality (DC) SR 6.2 - Continuous control and configuration changes
Timely response to monitoring (SR 6.2)
events (TRE) SR 7.4 - Control system Device configuration files stored
Resource availability recovery and in configuration management
(RA) reconstitution system (SR 7.4)
DTRS_DMZ-02 Identification and SR 1.5 - Authenticator HR Separations Policy Effective Unlikely Insignificant D
authentication control management Physical keys (SR 1.5)
(IAC) SR 4.3 - Use of Central monitoring of access
Resource availability cryptography control and configuration changes
(RA) SR 6.2 - Continuous (SR 6.2)
monitoring Device configuration files stored
SR 7.4 - Control system in configuration management
recovery and system (SR 7.4)
reconstitution
Risk name IEC 62443-3-3 IEC 62443-3-3 system Planned controls Control Likelihood Consequence Residual
foundational requirements effectiveness rating rating planned risk
requirements rating
DTRS_SuC-01 Identification and SR 1.1 RE 2 - SR 1.1 RE 2 - Multifactor Effective Almost Minor D
authentication control Multifactor authentication for privileged unprecedented
(IAC) authentication for access
Use control (UC) untrusted networks Central monitoring of access
Data confidentiality (DC) SR 2.8 RE 1 - Centrally control and configuration changes
Timely response to managed, system-wide (SR 2.8 RE 1)
events (TRE) audit trail Device configuration files stored
Resource availability SR 7.3 RE 2 - Backup in configuration management
(RA) automation system (SR 7.3 RE 2)
DTRS_DMZ-01 Identification and SR 1.1 RE 2 - SR 1.1 RE 2 - Multifactor Effective Almost Insignificant D
authentication control Multifactor authentication for privileged unprecedented
(IAC) authentication for access
Use control (UC) untrusted networks Central monitoring of access
Data confidentiality (DC) SR 2.8 RE 1 - Centrally control and configuration changes
Timely response to managed, system-wide (SR 2.8 RE 1)
events (TRE) audit trail Device configuration files stored
Resource availability SR 7.3 RE 2 - Backup in configuration management
(RA) automation system (SR 7.3 RE 2)
DTRS_DMZ-02 Identification and SR 2.8 RE 1 - Centrally SR 1.1 RE 2 - Multifactor Effective Very unlikely Insignificant D
authentication control managed, system-wide authentication for privileged
(IAC) audit trail access
Resource availability SR 7.3 RE 2 - Backup Central monitoring of access
(RA) automation control and configuration changes
(SR 2.8 RE 1)
Device configuration files stored
in configuration management
system (SR 7.3 RE 2)